scispace - formally typeset
Search or ask a question
Author

Laura Elezabeth

Bio: Laura Elezabeth is an academic researcher from Amity University. The author has contributed to research in topics: Process mining & Data security. The author has an hindex of 2, co-authored 6 publications receiving 11 citations.

Papers
More filters
Proceedings ArticleDOI
01 Aug 2018
TL;DR: In this paper, the various applications of big data mining techniques have been analyzed to improve the healthcare systems, including process mining and data mining technique have opened a new access for diagnosis of disease and also to provide effective treatment for a disease's triennial prevention.
Abstract: As technology is growing every day, the need for the technology is also becoming essential in every field. The amount of data generated by the healthcare industry is becoming tough to manage and to examine it in efficient manner for future use. In the healthcare field, massive amount of data is generated, from individual patient’s information to health history, clinical data and genetic data. The analysis of patient’s data is becoming more important, to evaluate the medical condition of patient and to prevent and take precautions for future. With the help of technology and computerized automation of machines, data can be analyzed in more efficient manner. Managing the huge volume of data has many problems interrelated to data security, data integrity and inconsistency. Process mining and data mining techniques have opened a new access for diagnosis of disease. Similarly, to provide effective treatment for a disease’s triennial prevention, data mining can be used. Big data mining can aid in analyzing medical operation indicators of hospitals for a period to help hospital administrators provide data support for medical decision-making. In this manuscript, the various applications of big data mining techniques have been analyzed to improve the healthcare systems.

9 citations

Proceedings ArticleDOI
01 Feb 2019
TL;DR: This manuscript epitomizes the general work process of cyber or digital physical frameworks, and identifies the conceivable vulnerabilities, assault issues, foes qualities and an arrangement of difficulties that are required to be addressed.
Abstract: In this manuscript, we explore the network and cyber security challenges furthermore, issues of cyber or digital physical frameworks. (1) We epitomize the general work process of cyber or digital physical frameworks, (2) identify the conceivable vulnerabilities, assault issues, foes qualities and an arrangement of difficulties that are required to be addressed. A framework has been proposed for setting situation-apprehensive security structure for general digital or cyber physical frameworks with the implementation of biometrics.

7 citations

Book ChapterDOI
25 Oct 2018

2 citations

Proceedings ArticleDOI
01 Dec 2018
TL;DR: The process mining may be useful to provide the secure system as this approach can help to monitor the network to detect the intrusions in real time.
Abstract: Business Intelligence is referred as to the technical and procedural framework that complies, saves and scrutinizes the information composed by the activities of the company. Industries and organizations are now deciding to shift their focus from agent scaling focus development to operations effectiveness focused development. Because of this, a proper system is required to facilitate this new development and as a result, the Business Intelligence applications are needed in the organization. At the same time, the organization's network security is also becoming a big issue. Herein, we have analyzed the mining of processes approach for different industries as well as the security issue. To improve efficiency in the system, the IT department is required to facilitate the secure infrastructure. The process mining may be useful to provide the secure system as this approach can help to monitor the network to detect the intrusions in real time.

2 citations

Proceedings ArticleDOI
01 Dec 2018
TL;DR: The research of FSO data center is gaining more value as well usage of Hybrid switching over the other optical switching techniques, which returns a better performance, low complexity as well as cost effective.
Abstract: With the increase in data applications, there is need to manage the growing data congestion in data center. The popular techniques such as optical switching is used to transfer the data. But with an increase in data size we need to explore new concepts and architecture which returns a better performance, low complexity as well as cost effective. The research of FSO data center is gaining more value as well usage of Hybrid switching over the other optical switching techniques.

Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper , the authors present the results of an extensive systematic literature review on process mining in healthcare in which 263 papers have been reviewed and highlight the evolution of the research domain by considering time trends within the review dimensions.

17 citations

Journal ArticleDOI
TL;DR: In this paper, the authors present a rapidly maturing framework based upon a disturbance and impact resilience evaluation process that considers both the methodologies for assessing resilience and also how key design principals must be applied within distributed control systems to achieve resilience.
Abstract: Because the research area of resilient control systems was pioneered during the last decade, the basis and benchmarking of resilience have continued to mature to achieve what has long been understood as the ultimate benefit of resilience. However, the automation “ship” has long since sailed on society’s dependence on digital control systems as the basis for all our industries and even the appliances in our homes. While these systems have been in general very reliable and provided for many human and operational efficiencies, the designs were not built on a framework that recognizes and adapts to potential debilitating failures from events such as cyber-attack. In this review, we cover a rapidly maturing framework based upon a disturbance and impact resilience evaluation process that considers both the methodologies for assessing resilience and also how key design principals must be applied within distributed control systems to achieve resilience.

5 citations

DOI
04 Oct 2021
TL;DR: In this article, the authors proposed an approach for grouping hospital inpatient service efficiency that have the same characteristics into certain clusters based on BOR, BTO, TOI, and AvLOS indicators using Agglomerative Hierarchical Clustering.
Abstract: Purpose: The research proposed an approach for grouping hospital inpatient service efficiency that have the same characteristics into certain clusters based on BOR, BTO, TOI, and AvLOS indicators using Agglomerative Hierarchical Clustering. Design/methodology/approach: Applying Agglomerative Hierarchical Clustering with dissimilarity measures such as single linkage, complete linkage, average linkage, and ward linkage. Findings/result: The experiment result has shown that ward linkage was given a quite good score of silhouette coefficient reached 0.4454 for the evaluation of cluster quality. The cluster formed using ward linkage was more proportional than the other dissimilarity measures. Ward linkage has generated cluster 0 consists of 23 members, cluster 1 consists of 34 members, while both of cluster 2 and 3 consists of only 1 member respectively. The experiment reported that each cluster had problems with inpatient indicators that were not ideal and even exceeded the ideal limit, but cluster 0 generated the ideal BOR and TOI parameters, both reached 52.17% (12 of 23 hospital inpatient) and 78.36% (18 of 23 hospital inpatient) respectively. Originality/value/state of the art: Based on previous research, this study provides an alternative to produce more proportional, representative and quality clusters in mapping hospital inpatient service efficiency that have the same characteristics into certain clusters using Agglomerative Hierarchical Clustering Method compared to the K-means Clustering Method which is often trapped in local optima.

4 citations

Journal ArticleDOI
TL;DR: In this paper , the authors demonstrate a healthcare cost optimization system as well as a case study based on two IT setup configurations that have been evaluated by medical experts and IT experts and demonstrate how CySecTool handles this difficulty.

4 citations